Join the discussion
Question 1/320
Which of the following systems would MOST likely be found in a screened subnet?
Correct Answer: B
FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet1. A screened subnet typically hosts systems that need to be accessed by both internal and external users, such as web servers, email servers, or FTP servers. Reference: https://www.techtarget.com/searchsecurity/definition/screened-subnet#:~:text=A%20screened%20subnet%2C%20or%20triple-homed%20firewall%2C%20refers%20to,a%20perimeter%20network%20to%20isolate%20or%20separate%20the 1
Add Comments
- Other Question (320q)
- Q1. Which of the following systems would MOST likely be found in a screened subnet?...
- Q2. A computer engineer needs to ensure that only a specific workstation can connect to port 1...
- Q3. A packet is assigned a value to ensure it does not traverse a network indefinitely. Which ...
- Q4. An engineer recently decided to upgrade the firmware on a router. During the upgrade, the ...
- Q5. Which of the following BEST describes a spirt-tunnel client-to-server VPN connection?...
- Q6. An IT officer is installing a new WAP. Which of the following must the officer change to c...
- Q7. A corporate client is experiencing global system outages. The IT team has identified multi...
- Q8. Which of the following would be the MOST likely attack used to bypass an access control ve...
- Q9. A wireless network was installed in a warehouse for employees to scan crates with a wirele...
- Q10. An administrator would like to create a fault-tolerant ring between three switches within ...
- Q11. Which of the following can be used to decrease latency during periods of high utilization ...
- Q12. A website administrator is concerned the company's static website could be defaced by hack...
- Q13. Which of the following is MOST likely to generate significant East-West traffic in a datac...
- Q14. A systems administrator is running a VoIP network and is experiencing jitter and high late...
- Q15. Which of the following is considered a physical security detection device?...
- Q16. Two remote offices need to be connected securely over an untrustworthy MAN. Each office ne...
- Q17. A network administrator has received calls every day for the past few weeks from three use...
- Q18. A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With...
- Q19. Logs show an unauthorized IP address entering a secure part of the network every night at ...
- Q20. AGRE tunnel has been configured between two remote sites. Which of the following features,...
- Q21. A company has multiple offices around the world. The computer rooms in some office locatio...
- Q22. Which of the following is MOST commonly used to address CVEs on network equipment and/or o...
- Q23. Given the following Information: (Exhibit) Which of the following would cause performance ...
- Q24. A network administrator is configuring a load balancer for two systems. Which of the follo...
- Q25. You are tasked with verifying the following requirements are met in order to ensure networ...
- Q26. Which of the following can be used to store various types of devices and provide contactle...
- Q27. A small office has a wireless network with several access points that are used by mobile d...
- Q28. A security engineer is trying to determine whether an internal server was accessed by host...
- Q29. Given the following output: (Exhibit) Which of the following attacks is this MOST likely a...
- Q30. A technician is installing a high-density wireless network and wants to use an available f...
- Q31. A firewall administrator is implementing a rule that directs HTTP traffic to an internal s...
- Q32. A network administrator is implementing OSPF on all of a company's network devices. Which ...
- Q33. An ISP is providing Internet to a retail store and has terminated its point of connection ...
- Q34. Which of the following OSI model layers is where conversations between applications are es...
- Q35. SIMULATION You have been tasked with setting up a wireless network in an office. The netwo...
- Q36. Which of the following is the LARGEST MTU for a standard Ethernet frame?...
- Q37. Which of the following is MOST commonly used to address CVEs on network equipment and/or o...
- Q38. Within the realm of network security, Zero Trust:...
- Q39. A technician is consolidating a topology with multiple SSlDs into one unique SSiD deployme...
- Q40. According to troubleshooting methodology, which of the following should the technician do ...
- Q41. A newly installed multifunction copier needs to be set up so scanned documents can be emai...
- Q42. A network administrator wants to analyze attacks directed toward the company's network. Wh...
- Q43. A network client is trying to connect to the wrong TCP port. Which of the following respon...
- Q44. Two users on a LAN establish a video call. Which of the following OSI model layers ensures...
- Q45. Which of the following is the MOST cost-effective alternative that provides proper cabling...
- Q46. Which of the following is the physical topology for an Ethernet LAN?...
- Q47. A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the...
- Q48. A network technician is configuring a new firewall for a company with the necessary access...
- Q49. A technician is installing a new fiber connection to a network device in a datacenter. The...
- Q50. A technician is configuring a wireless network and needs to ensure users agree to an AUP b...
- Q51. A user is having difficulty with video conferencing and is looking for assistance. Which o...
- Q52. A network administrator Is looking at switch features and is unsure whether to purchase a ...
- Q53. A technician is configuring a wireless network and needs to ensure users agree to an AUP b...
- Q54. A technician installed an 8-port switch in a user's office. The user needs to add a second...
- Q55. A store owner would like to have secure wireless access available for both business equipm...
- Q56. Which of the following protocols can be used to change device configurations via encrypted...
- Q57. Which of the following protocols can be used to change device configurations via encrypted...
- Q58. Which of the following connector types would be used to connect to the demarcation point a...
- Q59. Logs show an unauthorized IP address entering a secure part of the network every night at ...
- Q60. A network administrator is designing a wireless network. The administrator must ensure a r...
- Q61. A company ranis out a largo event space and includes wireless internet access for each ten...
- Q62. Which of the following allows for an devices within a network to share a highly reliable t...
- Q63. A company is deploying a SAN at headquarters and a branch office 1, 000ml (1,609km) away t...
- Q64. Which of the following would be used to expedite MX record updates to authoritative NSs?...
- Q65. During the troubleshooting of an E1 line, the point-to-point link on the core router was a...
- Q66. A firewall administrator is implementing a rule that directs HTTP traffic to an internal s...
- Q67. A network administrator is trying to identify a device that is having issues connecting to...
- Q68. Given the following output: (Exhibit) Which of the following attacks is this MOST likely a...
- Q69. A network technician is investigating an IP phone that does not register in the VoIP syste...
- Q70. A network technician is installing new software on a Windows-based server in a different g...
- Q71. A network administrator is getting reports of some internal users who cannot connect to ne...
- Q72. A network administrator is setting up a new phone system and needs to define the location ...
- Q73. Which of the following is the MOST appropriate use case for the deployment of a clientless...
- Q74. Which of the following service models would MOST likely be used to replace on-premises ser...
- Q75. A technician is troubleshooting a wireless connectivity issue in a small office located in...
- Q76. Which of the following protocol types describes secure communication on port 443?...
- Q77. A technician is installing a high-density wireless network and wants to use an available f...
- Q78. Which of the following is a requirement when certifying a network cabling as Cat 7?...
- Q79. An engineer notices some late collisions on a half-duplex link. The engineer verifies that...
- Q80. A network technician is having issues connecting an loT sensor to the internet The WLAN se...
- Q81. A business is using the local cable company to provide Internet access. Which of the follo...
- Q82. After the A record of a public website was updated, some visitors were unable to access th...
- Q83. While waking from the parking lot lo an access-controlled door an employee sees an authori...
- Q84. A network administrator redesigned the positioning of the APs to create adjacent areas of ...
- Q85. A network engineer is investigating reports of poor network performance. Upon reviewing a ...
- Q86. An engineer needs to restrict the database servers that are in the same subnet from commun...
- Q87. A company requires a disaster recovery site to have equipment ready to go in the event of ...
- Q88. The network administrator is informed that a user's email password is frequently hacked by...
- Q89. A network field technician is installing and configuring a secure wireless network. The te...
- Q90. A company wants to implement a large number of WAPs throughout its building and allow user...
- Q91. A company's data center is hosted at its corporate office to ensure greater control over t...
- Q92. A company is deploying a SAN at headquarters and a branch office 1, 000ml (1,609km) away t...
- Q93. Which of the following connector types would have the MOST flexibility?...
- Q94. A network administrator needs to provide evidence to confirm that recent network outages w...
- Q95. Which of the following would be BEST to install to find and block any malicious users with...
- Q96. All packets arriving at an interface need to be fully analyzed. Which of me following feat...
- Q97. A company hired a technician to find all the devices connected within a network. Which of ...
- Q98. Which of the following would be increased by adding encryption to data communication acros...
- Q99. A small office is running WiFi 4 APs, and neighboring offices do not want to increase the ...
- Q100. The following configuration is applied to a DHCP server connected to a VPN concentrator: (...
- Q101. A technician is monitoring a network interface and notices the device is dropping packets....
- Q102. A network administrator is installing a new server in me data center. The administrator is...
- Q103. A technician is investigating an issue with connectivity at customer's location. The techn...
- Q104. A company that uses VoIP telephones is experiencing intermittent issues with one-way audio...
- Q105. A medical building offers patients Wi-Fi in the waiting room. Which of the following secur...
- Q106. The Chief Executive Officer of a company wants to ensure business operations are not disru...
- Q107. A network administrator determines that even when optimal wireless coverage is configured,...
- Q108. Which of the following would be used when connecting devices that have different physical ...
- Q109. A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. ...
- Q110. A technician wants to deploy a new wireless network that comprises 30 WAPs installed throu...
- Q111. SIMULATION A network technician replaced a switch and needs to reconfigure it to allow the...
- Q112. Access to a datacenter should be individually recorded by a card reader even when multiple...
- Q113. A network technician receives a support ticket about an employee who has misplaced a compa...
- Q114. A network is experiencing extreme latency when accessing a particular website. Which of th...
- Q115. While setting up a new workstation, a technician discovers that the network connection is ...
- Q116. A network administrator needs to run a single command-line tool capable of displaying rout...
- Q117. Which of the following would enable a network technician to implement dynamic routing?...
- Q118. Which of the following routing protocols is used to exchange route information between pub...
- Q119. A technician is connecting DSL for a new customer. After installing and connecting the on-...
- Q120. Which of the following is a system that is installed directly on a server's hardware and a...
- Q121. A network technician is hired to review all the devices within a network and make recommen...
- Q122. To access production applications and data, developers must first connect remotely to a di...
- Q123. A Chief Executive Officer and a network administrator came to an agreement With a vendor t...
- Q124. A company is designing a SAN and would like to use STP as its medium for communication. Wh...
- Q125. Which of the following would MOST likely utilize PoE?...
- Q126. An administrator is investigating reports of network slowness in a building. While looking...
- Q127. A company wants to set up a backup data center that can become active during a disaster. T...
- Q128. An administrator is writing a script to periodically log the IPv6 and MAC addresses of all...
- Q129. A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. ...
- Q130. A company requires a disaster recovery site to have equipment ready to go in the event of ...
- Q131. An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable upli...
- Q132. A Chief Executive Officer and a network administrator came to an agreement With a vendor t...
- Q133. A network client is trying to connect to the wrong TCP port. Which of the following respon...
- Q134. Which of the following provides guidance to an employee about restricting non-business acc...
- Q135. A technician wants to deploy a new wireless network that comprises 30 WAPs installed throu...
- Q136. A network administrator determines that even when optimal wireless coverage is configured,...
- Q137. A network administrator is getting reports of some internal users who cannot connect to ne...
- Q138. Users in a branch can access an ln-house database server, but II is taking too long to fet...
- Q139. There are two managed legacy switches running that cannot be replaced or upgraded. These s...
- Q140. A large metropolitan city is looking to standardize the ability tor police department lapt...
- Q141. Which of the following compromises internet-connected devices and makes them vulnerable to...
- Q142. A network administrator redesigned the positioning of the APs to create adjacent areas of ...
- Q143. A network administrator is given the network 80.87.78.0/26 for specific device assignments...
- Q144. A network administrator is installing a new server in the data center. The administrator i...
- Q145. A network technician has determined the cause of a network disruption. Which of the follow...
- Q146. Which of the following would MOST likely utilize PoE?...
- Q147. A WAN technician reviews activity and identifies newly installed hardware that is causing ...
- Q148. An engineer is using a tool to run an ICMP sweep of a network to find devices that are onl...
- Q149. A technician is implementing a new wireless network to serve guests at a local office. The...
- Q150. Which of the following is used to track and document various types of known vulnerabilitie...
- Q151. During a client audit, a network analyst is tasked with recommending changes to upgrade th...
- Q152. A network technician receives a report from the server team that a server's network connec...
- Q153. A company that uses VoIP telephones is experiencing intermittent issues with one-way audio...
- Q154. A network manager is configuring switches in IDFs to ensure unauthorized client computers ...
- Q155. Which of the following documents would be used to define uptime commitments from a provide...
- Q156. A false camera is installed outside a building to assist with physical security. Which of ...
- Q157. An administrator would like to allow Windows clients from outside me office to access work...
- Q158. A network engineer performs the following tasks to increase server bandwidth: Connects two...
- Q159. Which of the following allows for an devices within a network to share a highly reliable t...
- Q160. A network technician receives a report from the server team that a server's network connec...
- Q161. An organization with one core and five distribution switches is transitioning from a star ...
- Q162. An administrator is setting up a multicast server on a network, but the firewall seems to ...
- Q163. Several employees have expressed concerns about the company monitoring their internet acti...
- Q164. A local firm has hired a consulting company to clean up its IT infrastructure. The consult...
- Q165. A network administrator received a report staling a critical vulnerability was detected on...
- Q166. A network engineer is investigating reports of poor performance on a videoconferencing app...
- Q167. An IDS was installed behind the edge firewall after a network was breached. The network wa...
- Q168. A company built a new building at its headquarters location. The new building is connected...
- Q169. A network security engineer locates an unapproved wireless bridge connected to the corpora...
- Q170. A company is moving to a new building designed with a guest waiting area that has existing...
- Q171. Which of the following is the physical security mechanism that would MOST likely be used t...
- Q172. A network administrator wants to test the throughput of a new metro Ethernet circuit to ve...
- Q173. A Network engineer is investigating issues on a Layer 2 Switch. The department typically s...
- Q174. Given the following information: (Exhibit) Which of the following command-line tools would...
- Q175. Which of the following protocols is widely used in large-scale enterprise networks to supp...
- Q176. A network technician was hired to harden the security of a network. The technician is requ...
- Q177. A Network engineer is investigating issues on a Layer 2 Switch. The department typically s...
- Q178. A network technician is having issues connecting an loT sensor to the internet The WLAN se...
- Q179. A technician wants to monitor and provide traffic segmentation across the network. The tec...
- Q180. Which of the following would be BEST to use to detect a MAC spoofing attack?...
- Q181. Which of the following is used to elect an STP root?...
- Q182. A user is having difficulty with video conferencing and is looking for assistance. Which o...
- Q183. An international company is transferring its IT assets including a number of WAPs from the...
- Q184. The management team needs to ensure unnecessary modifications to the corporate network are...
- Q185. A technician is troubleshooting reports that a networked printer is unavailable. The print...
- Q186. A technician is documenting an application that is installed on a server and needs to veri...
- Q187. A new cabling certification is being requested every time a network technician rebuilds on...
- Q188. During the troubleshooting of an E1 line, the point-to-point link on the core router was a...
- Q189. A technician is troubleshooting a previously encountered issue. Which of the following sho...
- Q190. A technician is writing documentation regarding a company's server farm. The technician ne...
- Q191. A new student is given credentials to log on to the campus Wi-Fi. The student stores the p...
- Q192. Which of the following describes the BEST device to configure as a DHCP relay?...
- Q193. After a critical power issue, the network team was not receiving UPS status notifications....
- Q194. A network administrator is configuring logging on an edge switch. The requirements are to ...
- Q195. A technician is installing a cable modem in a SOHO. Which of the following cable types wil...
- Q196. Client devices cannot enter a network, and the network administrator determines the DHCP s...
- Q197. Which of the following is conducted frequently to maintain an updated list of a system's w...
- Q198. Which of the following is MOST appropriate for enforcing bandwidth limits when the perform...
- Q199. An employee working in a warehouse facility is experiencing interruptions in mobile applic...
- Q200. Which of the following devices Is used to configure and centrally manage access points Ins...
- Q201. Two users on a LAN establish a video call. Which of the following OSI model layers ensures...
- Q202. A network technician is troubleshooting an application issue. The technician is able to re...
- Q203. A technician is deploying a new switch model and would like to add it to the existing netw...
- Q204. An organization wants to implement a method of centrally managing logins to network servic...
- Q205. A network technician is performing tests on a potentially faulty network card that is inst...
- Q206. A network administrator is troubleshooting the communication between two Layer 2 switches ...
- Q207. Which of the following should be used to manage outside cables that need to be routed to v...
- Q208. Which of the following network devices can perform routing between VLANs?...
- Q209. A wireless network was installed in a warehouse for employees to scan crates with a wirele...
- Q210. At the destination host, which of the following OSI model layers will discard a segment wi...
- Q211. The following DHCP scope was configured for a new VLAN dedicated to a large deployment of ...
- Q212. Which of the following is a requirement when certifying a network cabling as Cat 7?...
- Q213. A technician is investigating packet loss to a device that has varying data bursts through...
- Q214. Which of the following DHCP settings would be used to ensure a device gets the same IP add...
- Q215. A firewall administrator is implementing a rule that directs HTTP traffic to an internal s...
- Q216. To comply with an industry regulation, all communication destined to a secure server shoul...
- Q217. A network is experiencing a number of CRC errors during normal network communication. At w...
- Q218. Users are reporting intermittent Wi-Fi connectivity in specific parts of a building. Which...
- Q219. After a firewall replacement, some alarms and metrics related to network availability stop...
- Q220. SIMULATION You have been tasked with setting up a wireless network in an office. The netwo...
- Q221. A network administrator has been directed to present the network alerts from the past week...
- Q222. A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode...
- Q223. An IT administrator received an assignment with the following objectives * Conduct a total...
- Q224. A network administrator is installing a wireless network at a client's office. Which of th...
- Q225. An IT organization needs to optimize speeds for global content distribution and wants to r...
- Q226. Which of the following service models would MOST likely be used to replace on-premises ser...
- Q227. A network engineer receives the following when connecting to a switch to configure a port:...
- Q228. Which of the Mowing architectures reduces network latency by enforcing a limit on the numb...
- Q229. Which of me following security controls indicates unauthorized hardware modifications?...
- Q230. Many IP security cameras use RTSP to control media playback. Which of the following defaul...
- Q231. Which of the following documents would be used to define uptime commitments from a provide...
- Q232. A network administrator is setting up a new phone system and needs to define the location ...
- Q233. A technician is troubleshooting a connectivity issue with an end user. The end user can ac...
- Q234. A network resource was accessed by an outsider as a result of a successful phishing campai...
- Q235. Given the following information: (Exhibit) Which of the following command-line tools would...
- Q236. A network administrator is reviewing interface errors on a switch. Which of the following ...
- Q237. All packets arriving at an interface need to be fully analyzed. Which of me following feat...
- Q238. A network technician is hired to review all the devices within a network and make recommen...
- Q239. A corporation is looking for a method to secure all traffic between a branch office and it...
- Q240. Users attending security training at work are advised not to use single words as passwords...
- Q241. A technician is trying to determine whether an LACP bundle is fully operational. Which of ...
- Q242. A user reports that a new VoIP phone works properly but the computer that is connected to ...
- Q243. An AP uses a 98ft (30m) Cat 6 cable to connect to an access switch. The cable is wired thr...
- Q244. After HVAC failures caused network outages, the support team decides to monitor the temper...
- Q245. A network administrator is troubleshooting a connectivity performance issue. As part of th...
- Q246. Which of the following ports should be used to securely receive mail that is synchronized ...
- Q247. Due to concerns around single points of failure, a company decided to add an additional WA...
- Q248. A network administrator installed an additional IDF during a building expansion project. W...
- Q249. An administrator notices that after contact with several switches in an MDF they failed du...
- Q250. A network administrator views a network pcap and sees a packet containing the following: (...
- Q251. A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the...
- Q252. A store owner would like to have secure wireless access available for both business equipm...
- Q253. Which of the following is the MOST cost-effective alternative that provides proper cabling...
- Q254. A network administrator received a report staling a critical vulnerability was detected on...
- Q255. A company streams video to multiple devices across a campus. When this happens, several us...
- Q256. Which of the following protocols will a security appliance that is correlating network eve...
- Q257. A large number of PCs are obtaining an APIPA IP address, and a number of new computers wer...
- Q258. A network administrator is configuring a load balancer for two systems. Which of the follo...
- Q259. A new office space is being designed. The network switches are up. but no services are run...
- Q260. Several employees have expressed concerns about the company monitoring their internet acti...
- Q261. An ISP is unable to provide services to a user in a remote area through cable and DSL. Whi...
- Q262. Which of the following attacks encrypts user data and requires a proper backup implementat...
- Q263. A network engineer is designing a wireless network that has the following requirements: * ...
- Q264. Which of the following layers of the OSI model has new protocols activated when a user mov...
- Q265. A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following...
- Q266. A customer needs to distribute Ethernet to multiple computers in an office. The customer w...
- Q267. A technician knows the MAC address of a device and is attempting to find the device's IP a...
- Q268. A WAN technician reviews activity and identifies newly installed hardware that is causing ...
- Q269. SIMULATION You have been tasked with setting up a wireless network in an office. The netwo...
- Q270. A network technician receives a support ticket about an employee who has misplaced a compa...
- Q271. An engineer is designing a network topology for a company that maintains a large on-premis...
- Q272. A network technician is troubleshooting an area where the wireless connection to devices i...
- Q273. A company wants to add a local redundant data center to its network in case of failure at ...
- Q274. Which of the following network devices can perform routing between VLANs?...
- Q275. While waking from the parking lot lo an access-controlled door an employee sees an authori...
- Q276. Which of the following documents would be used to define uptime commitments from a provide...
- Q277. A company needs a redundant link to provide a channel to the management network in an inci...
- Q278. Switch 3 was recently added lo an existing stack to extend connectivity to various parts o...
- Q279. An ISP is providing Internet to a retail store and has terminated its point of connection ...
- Q280. Network connectivity in an extensive forest reserve was achieved using fiber optics. A net...
- Q281. Which of the following attacks, if successful, would provide a malicious user who is conne...
- Q282. Due to concerns around single points of failure, a company decided to add an additional WA...
- Q283. A company joins a bank's financial network and establishes a connection to the clearinghou...
- Q284. A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, ...
- Q285. A network technician has multimode fiber optic cable available in an existing IDF. Which o...
- Q286. Which of the following would be the MOST likely attack used to bypass an access control ve...
- Q287. Which of the following policies is MOST commonly used for guest captive portals?...
- Q288. An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable upli...
- Q289. A network administrator walks into a datacenter and notices an unknown person is following...
- Q290. An engineer is gathering data to determine the effectiveness of UPSs in use at remote reta...
- Q291. A network engineer is designing a new secure wireless network. The engineer has been given...
- Q292. Which of the following is used to provide networking capability for VMs at Layer 2 of the ...
- Q293. A new global ISP needs to connect from central offices in North America to the United King...
- Q294. A technician is investigating why a PC cannot reach a file server with the IP address 192....
- Q295. An engineer is gathering data to determine the effectiveness of UPSs in use at remote reta...
- Q296. Which of the following ports are associated with IMAP? (Choose two.)...
- Q297. AGRE tunnel has been configured between two remote sites. Which of the following features,...
- Q298. Which of the following ports is commonly used by VoIP phones?...
- Q299. Which of the following can be used to centrally manage credentials for various types of ad...
- Q300. Which of the following OSI model layers would allow a user to access and download flies fr...
- Q301. A network administrator discovers that users in an adjacent building are connecting to the...
- Q302. Which of the following will reduce routing table lookups by performing packet forwarding d...
- Q303. A network engineer is investigating reports of poor network performance. Upon reviewing a ...
- Q304. Users within a corporate network need to connect to the Internet, but corporate network po...
- Q305. Which of the following TCP ports is used by the Windows OS for file sharing?...
- Q306. A technician is deploying a new SSID for an industrial control system. The control devices...
- Q307. A user calls the help desk to report being unable to reach a file server. The technician l...
- Q308. A network administrator redesigned the positioning of the APs to create adjacent areas of ...
- Q309. A public, wireless ISP mounts its access points on top of traffic signal poles. Fiber-opti...
- Q310. A network administrator is configuring a database server and would like to ensure the data...
- Q311. A network technician needs to install security updates on several switches on me company's...
- Q312. An attacker targeting a large company was able to inject malicious A records into internal...
- Q313. An IT director is setting up new disaster and HA policies for a company. Limited downtime ...
- Q314. Access to a datacenter should be individually recorded by a card reader even when multiple...
- Q315. Which of the following ports are associated with IMAP? (Choose two.)...
- Q316. A company is reviewing ways to cut the overall cost of Its IT budget. A network technician...
- Q317. Which of the following protocols would enable a company to upgrade its internet connection...
- Q318. A help desk technician is concerned that a client's network cable issues may be causing in...
- Q319. Which of the following can be used to decrease latency during periods of high utilization ...
- Q320. Which of the following would need to be configured to ensure a device with a specific MAC ...
